Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Security Firm Executive Targeted in Sophisticated Phishing Attack
    Cybersecurity

    Security Firm Executive Targeted in Sophisticated Phishing Attack

    adminBy adminMarch 17, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Phishing
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A C-level executive at Swedish exposure management and identity security firm Outpost24 was targeted in a sophisticated phishing attack, the company’s subsidiary Specops Software reports.

    The attack, likely mounted with a recently identified phishing-as-a-service kit named Kratos, relied on a seven-step chain that leveraged layered infrastructure and legitimate services to evade detection and deceive the recipient.

    The phishing message, impersonating financial services provider JP Morgan, appeared as if part of an existing email thread to increase its sense of legitimacy, and invited the recipient to review and sign a document.

    Furthermore, the attackers used two DomainKeys Identified Mail (DKIM) signatures to ensure the email would pass DMARC authentication and appear trustworthy.

    Within the message, the attackers included a ‘review document’ link pointing to the legitimate Cisco domain secure-web.cisco.com, which is typically used for rewriting URLs in emails after they have been validated by Cisco.

    Because the link passed Cisco’s Secure Email Gateway validation, the redirect URL was hosted on Cisco’s infrastructure, further allowing the phishing email to bypass detection systems.

    Advertisement. Scroll to continue reading.

    The next step in the chain involved a redirection to the legitimate email API platform Nylas, which was likely used to ensure that the phishing link would redirect through Cisco Secure Web infrastructure.

    “By chaining redirects through legitimate services such as Cisco and Nylas, the attackers increase the likelihood that the link will pass security filtering and reputation checks. These domains are widely trusted and commonly observed in legitimate traffic, which makes automated blocking more difficult,” Specops notes.

    Next, the target was redirected to a subdomain on the website of a legitimate development company based in India, and then to a domain that was originally registered in 2017 by a Chinese entity.

    The domain’s previous TLS certificate expired on March 6, the associated DNS records were released shortly after, and the domain was re-registered on March 12, with several new TLS certificates issued for it the same day.

    “The timing strongly suggests the domain was reacquired and repurposed specifically for this campaign,” Specops notes.

    The user was redirected once again, this time to phishing infrastructure that was deployed behind Cloudflare to hide its origin server. At this stage, the victim was served a browser validation check, likely meant to prevent security analysis.

    Finally, the victim would be served a convincing phishing page meant to harvest Microsoft 365 credentials.

    “Like the rest of the attack chain, this step is also carefully constructed, from a fake loading animation imitating Outlook to a check that validates whether the user input is actually an email. As the final step, the site attempts a legitimate login to verify that the captured credentials are valid,” Specops explains.

    The cybersecurity firm confirmed to SecurityWeek that the individual targeted in this attack was a C-level executive at its parent company Outpost24, underlining the sophistication of the attack.

    Specops did not attribute the incident to a specific threat actor but noted that the modus operandi aligns perfectly with that of Iran-linked threat actors that recently targeted various entities in the US.

    On the other hand, the firm said, other hacking groups have been observed employing similar tactics, and attribution remains elusive.

    Related: Internet Infrastructure TLD .arpa Abused in Phishing Attacks

    Related: Tycoon 2FA Phishing Platform Dismantled in Global Takedown

    Related: LastPass Warns of New Phishing Campaign

    Related: ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

    Attack Executive Firm Phishing Security sophisticated targeted
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article3 CMS Platforms Control 73% Of The Market & Shape Technical SEO Defaults
    Next Article Available’s $5B Project Qestrel aims to roll out 1,000 AI-ready edge data centers by year’s end
    admin
    • Website

    Related Posts

    Stryker attack raises concerns about role of device management tool

    March 17, 2026

    CISA flags Wing FTP Server flaw as actively exploited in attacks

    March 17, 2026

    GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

    March 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This Japanese SUV redefines affordable luxury

    March 17, 2026

    Stryker attack raises concerns about role of device management tool

    March 17, 2026

    What incrementality really means in affiliate marketing

    March 17, 2026

    Boox just fixed the one thing holding back my favorite Kindle replacement

    March 17, 2026
    Categories
    • Blogging (41)
    • Cybersecurity (811)
    • Privacy & Online Earning (123)
    • SEO & Digital Marketing (498)
    • Tech Tools & Mobile / Apps (995)
    • WiFi / Internet & Networking (132)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This Japanese SUV redefines affordable luxury

    March 17, 2026

    Stryker attack raises concerns about role of device management tool

    March 17, 2026

    What incrementality really means in affiliate marketing

    March 17, 2026
    Most Popular
    • This Japanese SUV redefines affordable luxury
    • Stryker attack raises concerns about role of device management tool
    • What incrementality really means in affiliate marketing
    • Boox just fixed the one thing holding back my favorite Kindle replacement
    • CISA flags Wing FTP Server flaw as actively exploited in attacks
    • Samsung Sound quality and effects 16.1.29 by Samsung Electronics Co., Ltd.
    • Available’s $5B Project Qestrel aims to roll out 1,000 AI-ready edge data centers by year’s end
    • Security Firm Executive Targeted in Sophisticated Phishing Attack
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.